Peter Yuryevich Levashov, a 38-year-old Russian national accused of operating the notorious Kelihos botnet, pleaded guilty on Wednesday to computer crime, fraud, conspiracy and identity theft charges. Levashov, aka “Petr Levashov,” “Peter Severa,” “Petr Severa” and “Sergey Astakhov,” is said to have operated several botnets between the late 1990s and […]
Haythem Elmir
New PyLocky Ransomware stands out for anti-machine learning capability
Security experts from Trend Micro have spotted a new strain of ransomware involved in attacks in July and August, the malicious code was posing as the Locky ransomware. Researchers at Trend Micro have detected a new ransomware family, dubbed PyLocky, that was used in attacks between July and August, the malware was […]
Mirai and Gafgyt target Apache Struts and SonicWall to hit enterprises
Security experts with Unit 42 at Palo Alto Networks have discovered new variants of the Mirai and Gafgyt IoT malware targeting enterprises. Both botnets appear very interesting for two main reasons: The new Mirai variant targets the same Apache Struts vulnerability exploited in the 2017 Equifax data breach. The vulnerability affects the Jakarta Multipart parser upload function […]
Un piratage massif compromet l’identité de 1 milliard d’Indiens
Les données biométriques et les informations personnelles de 1 milliard d’Indiens ont été piratées, a révélé mardi le HuffPost India, au terme d’une enquête de trois mois. Ces données étaient contenues dans une banque de données gouvernementale mal conçue. La banque de données Aadhaar, gérée par le ministère de l’Électronique et des […]
Wi-Jacking – New Wifi Attack Allow Accessing Millions of Neighbour’s WiFi Without Cracking
Newly identified WiFi attack called Wi-Jacking allow hackers to attack millions of WiFi network and accessing the neighbor’s WiFi without any form of Cracking. Researchers identified this flow in the interaction of browser behavior and the existing weakness in almost every home router that allows accessing millions of WiFi networks. This […]
Beware! Unpatched Safari Browser Hack Lets Attackers Spoof URLs
A security researcher has discovered a serious vulnerability that could allow attackers to spoof website addresses in the Microsoft Edge web browser for Windows and Apple Safari for iOS. While Microsoft fixed the address bar URL spoofing vulnerability last month as part of its monthly security updates, Safari is still unpatched, […]
Arab Security Conference 2018
OUR EVENT Arab Security Conference is an annual two-day cyber security conference with multi-track sessions, which strives to raise cyber security awareness in the Arab world. This year It will be held on the 23rd & 24th of September, 2018 at The Nile Ritz-Carlton, Cairo, Egypt. VISION To create secure societies. MISSION […]
IBM CORRIGE DES VULNÉRABILITÉS IMPORTANTES CONCERNANT WEBSPHERE
IBM a corrigé plusieurs vulnérabilités concernant la plateforme WebSphere. L’exploitation de ces vulnérabilités permettrait la divulgation d’informations sensibles, notamment les mots de passe et ce via des attaques par canal auxiliaire ou de contournement de chiffrement, et de provoquer un déni de service. Les vulnérabilités les plus importantes sont référencées comme suit […]
Police searching for suspects after ATM stolen from Sask. bank
Mounties are investing after a theft and an attempted theft of ATMs from two banks in Saskatchewan. The attempted theft happened early Sunday morning from a bank on James Street in Lumsden, Sask. Police say two or three suspects used a pick-up truck to try to remove the ATM when […]
Mongo Lock Attack Ransoming Deleted MongoDB Databases
An attack called Mongo Lock is targeting remotely accessible and unprotected MongoDB databases, wiping them, and then demanding a ransom in order to get the contents back. While this new campaign is using a name to identify itself, these types of attacks are not new and MongoDB databases have been targeted for a […]